US20090077156A1 - Efficient constraint monitoring using adaptive thresholds - Google Patents

Efficient constraint monitoring using adaptive thresholds Download PDF

Info

Publication number
US20090077156A1
US20090077156A1 US12/010,942 US1094208A US2009077156A1 US 20090077156 A1 US20090077156 A1 US 20090077156A1 US 1094208 A US1094208 A US 1094208A US 2009077156 A1 US2009077156 A1 US 2009077156A1
Authority
US
United States
Prior art keywords
local
constraint
remote site
network
global
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/010,942
Other languages
English (en)
Inventor
Srinivas Raghav Kashyap
Rajeev Rastogi
S. R. Jeyashankher
Pushpraj Shukla
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nokia of America Corp
Original Assignee
Lucent Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lucent Technologies Inc filed Critical Lucent Technologies Inc
Priority to US12/010,942 priority Critical patent/US20090077156A1/en
Priority to PCT/US2008/006878 priority patent/WO2008153840A2/fr
Assigned to LUCENT TECHNOLOGIES, INC. reassignment LUCENT TECHNOLOGIES, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: JEYASHANKHER, S R, KASHYAP, SRINIVAS RAGHAV, SHUKLA, PUSHPRAJ, RASTOGI, RAJEEV
Publication of US20090077156A1 publication Critical patent/US20090077156A1/en
Assigned to CREDIT SUISSE AG reassignment CREDIT SUISSE AG SECURITY AGREEMENT Assignors: ALCATEL LUCENT
Assigned to ALCATEL LUCENT reassignment ALCATEL LUCENT RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: CREDIT SUISSE AG
Abandoned legal-status Critical Current

Links

Images

Classifications

    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B18/00Surgical instruments, devices or methods for transferring non-mechanical forms of energy to or from the body
    • A61B18/04Surgical instruments, devices or methods for transferring non-mechanical forms of energy to or from the body by heating
    • A61B18/12Surgical instruments, devices or methods for transferring non-mechanical forms of energy to or from the body by heating by passing a current through the tissue to be heated, e.g. high-frequency current
    • A61B18/14Probes or electrodes therefor
    • A61B18/1442Probes having pivoting end effectors, e.g. forceps
    • A61B18/1445Probes having pivoting end effectors, e.g. forceps at the distal end of a shaft, e.g. forceps or scissors at the end of a rigid rod
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B18/00Surgical instruments, devices or methods for transferring non-mechanical forms of energy to or from the body
    • A61B18/04Surgical instruments, devices or methods for transferring non-mechanical forms of energy to or from the body by heating
    • A61B18/12Surgical instruments, devices or methods for transferring non-mechanical forms of energy to or from the body by heating by passing a current through the tissue to be heated, e.g. high-frequency current
    • A61B18/14Probes or electrodes therefor
    • A61B18/1402Probes for open surgery
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B17/00Surgical instruments, devices or methods, e.g. tourniquets
    • A61B2017/0046Surgical instruments, devices or methods, e.g. tourniquets with a releasable handle; with handle and operating part separable
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B17/00Surgical instruments, devices or methods, e.g. tourniquets
    • A61B17/28Surgical forceps
    • A61B17/29Forceps for use in minimally invasive surgery
    • A61B2017/2926Details of heads or jaws
    • A61B2017/2945Curved jaws
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B18/00Surgical instruments, devices or methods for transferring non-mechanical forms of energy to or from the body
    • A61B2018/00571Surgical instruments, devices or methods for transferring non-mechanical forms of energy to or from the body for achieving a particular surgical effect
    • A61B2018/00607Coagulation and cutting with the same instrument
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B18/00Surgical instruments, devices or methods for transferring non-mechanical forms of energy to or from the body
    • A61B18/04Surgical instruments, devices or methods for transferring non-mechanical forms of energy to or from the body by heating
    • A61B18/12Surgical instruments, devices or methods for transferring non-mechanical forms of energy to or from the body by heating by passing a current through the tissue to be heated, e.g. high-frequency current
    • A61B18/14Probes or electrodes therefor
    • A61B2018/1405Electrodes having a specific shape
    • A61B2018/1425Needle
    • A61B2018/1432Needle curved

Definitions

  • network monitoring systems When monitoring emerging large-scale, distributed systems (e.g., peer to peer systems, server clusters, Internet Protocol (IP) networks, sensor networks and the like), network monitoring systems must process large volumes of data in (or near) real-time from a widely distributed set of sources. For example, in a system that monitors a large network for distributed denial of service (DDoS) attacks, data from multiple routers must be processed at a rate of several gigabits per second. In addition, the system must detect attacks immediately after they happen (e.g., with minimal latency) to enable networks operators to take expedient countermeasures to mitigate effects of these attacks.
  • DDoS distributed denial of service
  • FIG. 1 illustrates a conventional distributed monitoring method utilizing what is referred to as a zero-slack scheme.
  • a central coordinator such as a network operations center s 0 assigns local constraint threshold values T i to each remote site s 1 , . . . , s n according to Equation (1) shown below.
  • T is a global constraint threshold value for the system and n is the number of nodes or remote sites in the system.
  • the global constraint threshold corresponds to the total number of bytes that passed the service provider network in the past second.
  • FIG. 1 illustrates a conventional distributed monitoring method. The method shown in FIG. 1 will be discussed with regard to the conventional system architecture shown in FIG. 2 .
  • variable x j may be the total amount of traffic (e.g., in bytes) entering into a network through an ingress point.
  • the variable x j may also be an observed number of cars on the highway, an amount of traffic from a monitored network in a day, the volume of remote login (e.g., TELNET, FTP, etc.) requests received by hosts within the organization that originate from the external hosts, packet loss at a given remote site or network node, etc.
  • step S 506 when the coordinator s 0 receives the local alarm transmission from site s j , the coordinator s 0 calculates an estimate of the global aggregate value according to Equation (2) shown below.
  • each local constraint T i represents an estimate of the current value of variable x i at each node other than x j , which are known at the central coordinator s 0 .
  • the central coordinator s 0 determines whether Equation (3) is satisfied.
  • the central coordinator s 0 sends a message requesting current values of the variable x i to each remote site s 1 , . . . , s n at step S 510 .
  • This transmission of messages is referred to as a “global poll.”
  • each remote site sends an update message including the current value of the variable x i .
  • the central coordinator s 0 determines if the global network constraint threshold T has been violated at step S 512 .
  • the central coordinator s 0 aggregates the values for variables x 1 , x 2 , . . . x n and compares the aggregate value with the global constraint threshold. If the aggregate value is greater than the global constraint threshold, then the central coordinator s 0 determines that the global constraint threshold T is violated. If the central coordinator s 0 determines that the global constraint threshold T is violated, the central controller s 0 records violation of the global constraint threshold in a memory at step S 514 . In one example, the central controller s 0 may generate a log, which includes time, date, and particular values associated with the constraint threshold violation.
  • step S 512 if the central coordinator s 0 determines that the global constraint threshold Tis not violated, the process terminates and no action is taken.
  • step S 508 if the central coordinator s 0 determines that Equation (3) is satisfied, the central coordinator s 0 determines that a global poll is not necessary, the process terminates and no action is taken.
  • This method is an example of a zero slack scheme in which the sum of the local thresholds T i for all remote sites in the network is equal to the global constraint threshold T, or in other words,
  • a local alarm transmission results in a global poll by the central coordinator s 0 because any violation of a local constraint threshold for any node causes the central coordinator s 0 to estimate that the global constraint threshold T is violated.
  • Using a zero-slack scheme results in relatively high communication costs due to the frequency of local alarms and global polls.
  • Example embodiments provide methods for tracking anomalous behavior in a network referred to as non-zero slack schemes, which may reduce the number of communication messages in the network (e.g., by about 60%) necessary to monitor emerging large-scale, distributed systems using distributed computation algorithms.
  • system behavior e.g., global polls
  • system behavior is determined by multiple values at the various sites, and not a single value as in the conventional art.
  • At least one illustrative embodiment uses Markov's Inequality to obtain a simple upper bound that expresses the global poll probability as the sum of independent components, one per remote site involving the local variable plus constraint at the remote site.
  • optimal local constraints e.g., the local constraints that minimize communication costs
  • Non-zero slack schemes may result in lower communication costs.
  • FIG. 1 illustrates a conventional method for distributed monitoring
  • FIG. 2 is a conventional system architecture
  • FIG. 3 is a flow chart illustrating a method for generating and assigning local constraints to remote sites in a system according to an illustrative embodiment
  • FIG. 4 is a flow chart illustrating a method for generating a local constraint using the Markov-based algorithm according to an illustrative embodiment
  • FIG. 5 is a flow chart illustrating a method for generating a local constraint for a remote site using a reactive algorithm according to an illustrative embodiment.
  • Illustrative embodiments are directed to methods for generating and/or assigning local constraints to nodes or remote sites within a network and methods for tracking anomalous behavior using the assigned local constraint thresholds.
  • Anomalous behavior may be used to indicate that action is required by a network operator and/or system operations center.
  • the methods described herein utilize non-zero slack scheme algorithms for determining local constraints that retain some slack in the system.
  • DSPs digital signal processors
  • ASICs application-specific-integrated-circuits
  • FPGAs field programmable gate arrays
  • each remote site is assigned a local constraint (or threshold) T i such that
  • the slack SL refers to the difference between the global threshold value and the sum of the remote site threshold values in the system. More particularly, the slack is given by
  • the global constraint may be decomposed into a set of local thresholds, T i at each remote site s i .
  • local constraint values hereinafter local constraints
  • T i may be generated and/or assigned such that
  • ⁇ i 1 n ⁇ T i ⁇ T .
  • an “uninteresting” event is a change in value at some remote site that does not cause a global function to exceed a threshold of interest.
  • One embodiment provides a method for assigning local constraints to nodes in a system using a “brute force” algorithm.
  • the method may be performed at the central coordinator s 0 in FIG. 1 .
  • FIG. 3 is a flow chart illustrating a method for generating and assigning local constraints to remote sites in a system according to an illustrative embodiment.
  • the communication between the central coordinator s 0 and each remote site s i may be performed concurrently.
  • the central coordinator s 0 receives histogram updates in an update message.
  • variable x i may be the total amount of traffic (e.g., in bytes) entering into a network through an ingress point.
  • variable x i may also be an observed number of cars on the highway, an amount of traffic from a monitored network in a day, the volume of remote login (e.g., TELNET, FTP, etc.) requests received by hosts within the organization that originate from the external hosts, packet loss at a given remote site or network node, etc.
  • the volume of remote login e.g., TELNET, FTP, etc.
  • each remote site si maintains a histogram of the constantly changing value of its local variable x i observed over time as H i (v), ⁇ v ⁇ [0, T], where H i (v) is the probability of variable x i having a value v).
  • the update messages may be sent and received periodically, wherein the period is referred to as the recompute interval.
  • the central coordinator s 0 in response to receiving the update messages from the remote sites, the central coordinator s 0 generates (calculates) local constraints T i for each remote site s i .
  • the central coordinator s 0 may generate local constraints T i based on a total system cost C as will be described in more detail below.
  • the coordinator s 0 first calculates a probability P l (i) of a local alarm for each individual remote site (hereinafter local alarm probability) according to Equation (4) shown below.
  • Equation (4) Pr(x i >T i ) is the probability that the observed value at remote site s i is greater than its threshold T i and is independently calculated for a given local constraint T i .
  • the local alarm probability P l (i) is entirely independent of the state of the other remote sites.
  • the local alarm probability P l (i) for each remote site s i is independent of values of variable x i at other remote sites in the system.
  • the central coordinator s 0 determines a probability P g of a global poll (hereinafter referred to as a global poll probability) in the system according to Equation (5) shown below:
  • Y i is an estimated value for x i at each remote site s i in the system.
  • the estimated values Y i are stored at the coordinator s 0 such that Y i ⁇ x i at all times.
  • the central coordinator s 0 updates the stored values Y i based on values x i reported in local alarms from each remote site.
  • the coordinator s 0 receives updates for values x i at remote site s i via a local alarm message generated by remote site s i once the observed value x i exceeds its local constraint T i .
  • the stored values Y i at the central coordinator s 0 for each remote site may be summarized as:
  • Y i ⁇ x i ⁇ ⁇ for ⁇ ⁇ each ⁇ ⁇ s i ⁇ ⁇ that ⁇ ⁇ reports ⁇ ⁇ a ⁇ ⁇ local ⁇ ⁇ alarm ; and T i ⁇ ⁇ for ⁇ ⁇ each ⁇ ⁇ s i ⁇ ⁇ that ⁇ ⁇ has ⁇ ⁇ not ⁇ ⁇ reported ⁇ ⁇ anything .
  • O(nT 2 ) is a standard notation indicating running time of an algorithm.
  • the global alarm probability P g is dependent on the state of all remote sites in the system. In other words, the global alarm probability P g is dependent on values of variable x i at other remote sites in the system.
  • the central coordinator s 0 generates the local threshold T i for remote site s i based on the total system cost C given by Equation (6) shown below.
  • Equation (6) P l (i) is the local alarm probability at site s i , P g is the global poll probability, C l is the cost of a local alarm transmission message from remote site s i to the coordinator s 0 and C g is the cost of performing a global poll by the central coordinator s 0 .
  • C l is O(l) and C g is O(n), where O(l) and O(n) differ by orders of magnitude.
  • O(l) is a constant independent of the size of system and O(n) is a quantity that grows linearly with the size of the system.
  • C l may be a first value (e.g., 10) and C g is another value (e.g., 100).
  • C l may be a first value (e.g., 10) and C g is another value (e.g., 100).
  • C l remains close to 10, but C g increases much larger than 100.
  • C g grows much faster than C l as network size increases.
  • the central coordinator s 0 generates local constraints T i for each remote site s i to minimize the total system cost C.
  • the central coordinator s 0 performs a naive exhaustive enumeration of all T n possible sets of local threshold values to generate the local constraints at each remote site that result in minimum total system cost C.
  • the local alarm probability P l (i) at each remote site s i and the global poll probability P g value are calculated to determine the total system cost C.
  • this naive enumeration has a running time of O(nT n+2 ).
  • the small constant ⁇ may be determined experimentally and assigned, for example, by a network operator at a network operations center.
  • step S 206 the central coordinator s 0 sends each generated local constraint T i to its corresponding remote site s i .
  • Another illustrative embodiment provides a method for generating local constraints using a Markov-based algorithm.
  • This embodiment uses Markov's inequality to approximate the global poll probability P g resulting in a decentralized algorithm, in which each site s i may independently determine its own local constraint T i .
  • Markov's inequality gives an upper bound for the probability that a non-negative function of a random variable is greater than or equal to some positive constant.
  • FIG. 4 is a flow chart illustrating a method for generating a local constraint using the Markov-based algorithm according to an illustrative embodiment. As noted above, the method shown in FIG. 4 may be performed at each individual remote site in the system.
  • remote site s i approximates a global poll probability P g according to Equation (7) shown below.
  • the approximation of the global poll probability P g obtained by the remote site s i represents the upper bound on the global poll probability P g .
  • the remote site s i estimates the total system cost C using Equation (8) shown below.
  • Equation (9) the remote site's estimated individual contribution to the total system cost E[Y i ] is given by Equation (9) shown below.
  • the remote site s i independently determines the local constraint T i based on its estimated individual contribution E[Y i ] to the estimated total system cost C given by Equation (8). More specifically, for example, the remote site s i independently calculates the local constraint T i that minimizes its contribution to the estimated total system cost C, thus allowing the remote site s i to calculate its local constraint T i independent of the coordinator s 0 .
  • the remote site s i may calculate its local constraint T i by performing a linear search in the range 0 to T. Because such a search requires O(T) running time, the running time may be reduced to O( ⁇ ) by searching for the optimal threshold value in a small range [T i ⁇ , T i + ⁇ ].
  • the linear search performed by the remote site s i may be performed at least once during each round or recompute interval. Each time remote site s i recalculates its local constraint T i , the remote site s i reports the newly calculated local constraint to the central coordinator s 0 via an update message.
  • each remote site in the system is allowed to independently determine their local threshold values, ensuring that
  • each remote site's local constraint may be restricted to a maximum of T/n by the central coordinator s 0 .
  • a restriction may reduce performance in cases where one site's value is very high on average compared to other sites.
  • the coordinator s 0 may determine if
  • the coordinator s 0 may reduce each threshold value T j by
  • Another illustrative embodiment provides a method for generating local constraints using what is referred to herein as a “reactive algorithm.”
  • the method for generating local constraints using the reactive algorithm may be performed at each remote site individually or at a central location such as central coordinator s 0 .
  • each remote site reports the newly calculated local constraint to the central coordinator in an update message during each recompute interval. If the method according to this illustrative embodiment is performed at the central coordinator s 0 , then the central coordinator s 0 assigns and sends the newly calculated local constraint to each remote site during each recompute interval. As noted above, the central coordinator s 0 and the remote sites may communicate in any well-known manner.
  • this embodiment will be described with regard to FIG. 1 , in particular, with the method being executed at remote site s i .
  • the remote site s i determines its own local constraint T i based on actual local alarm and global poll events within the system.
  • FIG. 5 is a flow chart illustrating a method for generating a local constraint for a remote site using a reactive algorithm according to an illustrative embodiment.
  • the remote site s i generates an initial local constraint T i , for example, using the above described Markov-based algorithm.
  • the remote site s i then adjusts the local constraint T i based on actual global poll and local alarm events in the system.
  • the remote site s i determines that the local constraint T i may be lower than an optimal value.
  • the remote site s i may increase its local constraint T i value by a factor ⁇ with a probability 1/ ⁇ i (or 1, if 1/ ⁇ i is greater than 1), where ⁇ and ⁇ i are parameters of the system greater than 0.
  • system parameter ⁇ is a constant selected by a network operator at the network operations center and is indicative of the rate of convergence.
  • Parameter ⁇ i is computed according to Equation (10) discussed in more detail below.
  • the remote site s i determines that its local constraint T i may be higher than an optimal value.
  • the remote site s i may reduce the threshold value by a factor of ⁇ with a probability ⁇ i (or 1, if ⁇ i is greater than 1).
  • the local constraint at remote site s i is not always decreased in response to a global poll, but rather is decreased probabilistically.
  • parameter ⁇ i may be set according to Equation (10) shown below.
  • probability P l (T i opt ) is the local alarm probability when the local threshold is set to T i opt and the probability P g opt is the global probability when all remote sites take the optimal local constraint values.
  • Equation (10) can be shown to be a valid value for ⁇ i because if each remote site s i does not have an optimal local constraint T i opt , then either (A) the current local constraint T i ′>T i opt , P l (T i ′) ⁇ P l (T i opt ) and P g (T i ′)>P g (T i opt ), or (B) current local constraint T i ′ ⁇ T i opt , P l (T i ′)>P l (T i opt ) and P g (T i ′) ⁇ P g (T i opt ).
  • the average number of observed local alarms is less than ⁇ i times the average number of observed global polls.
  • the local constraint value decreases over time from T i l .
  • the threshold value will increase if the threshold is less than T i opt .
  • the stable state of the system is reached when local constraints are optimized (e.g., T i opt ) using the reactive algorithm. Once the system reaches a stable state (at the optimal setting of local constraints), the communication overhead is minimized compared to all other states.
  • the remote site s i may utilize the Markov-based method to determine the local constraint T i that minimizes the total system cost C and use this value to compute the contribution of the remote site to P g .
  • the remote site s i sends its individual estimated contribution E[Y i ] of P g to the central coordinator s 0 at least once during or at the end of each recompute interval.
  • the central coordinator s 0 sums (or aggregates) the components of P g received from the remote sites and computes the P g value.
  • the coordinator s 0 sends this value of P g to each remote site, and each remote site uses this received value of P g to compute parameter ⁇ i .
  • Illustrative embodiments use an estimate of P g provided by the central coordinator s 0 to compute ⁇ i at each remote site. The remaining portions of information necessary are available locally at each remote site.
  • the above discussed embodiments may be used to generate and/or assign local thresholds to remote sites in the system of FIG. 2 , for example. Using these assigned local thresholds, methods for distributed monitoring may be performed more efficiently and system costs may be reduced. In one example, the local thresholds determined according to illustrative embodiments may be utilized in the distributed monitoring method discussed above with regard to FIG. 1 .
  • illustrative embodiments may be used to monitor the total amount of traffic flowing into a service provider network.
  • the monitoring setup includes acquiring information about ingress traffic of the network. This information may be derived by deploying passive monitors at each link or by collecting flow information (e.g., Netflow records) from the ingress routers (remote sites). Each monitor determines the total amount of traffic (e.g., in bytes) coming into the network through that ingress point. If the total amount of traffic exceeds a local constraint assigned to that ingress point, the monitor generates a local alarm. A network operations center may then perform a global poll of the system, and determine whether the total traffic across the system violates a global threshold, that is, a maximum total traffic through the network.
  • flow information e.g., Netflow records
  • ⁇ i 1 n ⁇ ( - log ⁇ ( 1 - l i ) ) ⁇ - log ⁇ ( 0.99 ) .
  • ⁇ log(1 ⁇ l i ) is local constraint T i and ⁇ log(0.99) is global constraint T.
  • the losses may be monitored in a network using distributed constraints monitoring. Delays can be monitored similarly using distributed SUM constraints.
  • illustrative embodiments may be used to raise an alert when the total number of cars on the highway exceeds a given number and report the number of vehicles detected, identify all destinations that receive more than a given amount of traffic from a monitored network in a day, and report their transfer totals, monitor the volume of remote login (e.g., TELNET, FTP, etc.) request received by hosts thin the organization that originate from the external hosts, etc.
  • remote login e.g., TELNET, FTP, etc.
US12/010,942 2007-06-08 2008-01-31 Efficient constraint monitoring using adaptive thresholds Abandoned US20090077156A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US12/010,942 US20090077156A1 (en) 2007-09-14 2008-01-31 Efficient constraint monitoring using adaptive thresholds
PCT/US2008/006878 WO2008153840A2 (fr) 2007-06-08 2008-05-30 Surveillance à bon rendement des contraintes par utilisation de seuils adaptatifs

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US99379007A 2007-09-14 2007-09-14
US12/010,942 US20090077156A1 (en) 2007-09-14 2008-01-31 Efficient constraint monitoring using adaptive thresholds

Publications (1)

Publication Number Publication Date
US20090077156A1 true US20090077156A1 (en) 2009-03-19

Family

ID=45529259

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/010,942 Abandoned US20090077156A1 (en) 2007-06-08 2008-01-31 Efficient constraint monitoring using adaptive thresholds

Country Status (2)

Country Link
US (1) US20090077156A1 (fr)
WO (1) WO2009036346A2 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100325265A1 (en) * 2009-06-18 2010-12-23 Technion Research & Development Foundation Ltd. Method and system of managing and/or monitoring distributed computing based on geometric constraints
CN107426011A (zh) * 2017-05-22 2017-12-01 郑州云海信息技术有限公司 一种对设备运行状态的监控方法及装置

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9549750B2 (en) * 2014-03-31 2017-01-24 Ethicon Endo-Surgery, Llc Surgical devices with articulating end effectors and methods of using surgical devices with articulating end effectors
US11172979B2 (en) 2019-07-02 2021-11-16 Jamison Alexander Removable tip for use with electrosurgical devices
US11191586B2 (en) 2019-07-02 2021-12-07 Jamison Alexander Removable tip for use with electrosurgical devices

Citations (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5539690A (en) * 1994-06-02 1996-07-23 Intel Corporation Write verify schemes for flash memory with multilevel cells
US6182157B1 (en) * 1996-09-19 2001-01-30 Compaq Computer Corporation Flexible SNMP trap mechanism
US6430613B1 (en) * 1998-04-15 2002-08-06 Bull, S.A. Process and system for network and system management
US20020138599A1 (en) * 2001-03-21 2002-09-26 Mark Dilman Method and apparatus for efficient Reactive monitoring
US20030061345A1 (en) * 2001-09-27 2003-03-27 Atsushi Kawasaki Network monitoring device and method
US20030079012A1 (en) * 2000-02-17 2003-04-24 Marsland Christopher John Kemote monitoring
US6571285B1 (en) * 1999-12-23 2003-05-27 Accenture Llp Providing an integrated service assurance environment for a network
US20030139905A1 (en) * 2001-12-19 2003-07-24 David Helsper Method and system for analyzing and predicting the behavior of systems
US20030198190A1 (en) * 2002-04-19 2003-10-23 Rajendran Rajan Method and system for traffic monitoring in a packet communication network
US6643613B2 (en) * 2001-07-03 2003-11-04 Altaworks Corporation System and method for monitoring performance metrics
US20050188221A1 (en) * 2004-02-24 2005-08-25 Covelight Systems, Inc. Methods, systems and computer program products for monitoring a server application
US6947972B2 (en) * 2000-12-01 2005-09-20 Samsung Electronics Co., Ltd. Alarm management system and method thereof for network management system
US7031264B2 (en) * 2003-06-12 2006-04-18 Avaya Technology Corp. Distributed monitoring and analysis system for network traffic
US7076695B2 (en) * 2001-07-20 2006-07-11 Opnet Technologies, Inc. System and methods for adaptive threshold determination for performance metrics
US7113988B2 (en) * 2000-06-29 2006-09-26 International Business Machines Corporation Proactive on-line diagnostics in a manageable network
US20060282530A1 (en) * 2005-06-14 2006-12-14 Klein Stephen D Methods and apparatus for end-user based service monitoring
US20060291657A1 (en) * 2005-05-03 2006-12-28 Greg Benson Trusted monitoring system and method
US7170791B2 (en) * 2003-05-20 2007-01-30 Sharp Kabushiki Kaisha Programming verification method of nonvolatile memory cell, semiconductor memory device, and portable electronic apparatus having the semiconductor memory device
US20070088823A1 (en) * 1999-10-27 2007-04-19 Fowler John J Method and System for Monitoring Computer Networks and Equipment
US20070171744A1 (en) * 2005-12-28 2007-07-26 Nima Mokhlesi Memories with alternate sensing techniques
US20080069334A1 (en) * 2006-09-14 2008-03-20 Lorraine Denby Data compression in a distributed monitoring system
US20080183855A1 (en) * 2006-12-06 2008-07-31 International Business Machines Corporation System and method for performance problem localization
US20080209032A1 (en) * 2007-02-22 2008-08-28 Inventec Corporation Alarm method for insufficient storage space of network storage system
US7430688B2 (en) * 2004-09-24 2008-09-30 Fujitsu Limited Network monitoring method and apparatus
US7453815B1 (en) * 1999-02-19 2008-11-18 3Com Corporation Method and system for monitoring and management of the performance of real-time networks
US7457868B1 (en) * 2003-12-30 2008-11-25 Emc Corporation Methods and apparatus for measuring network performance
US20090234944A1 (en) * 2000-06-21 2009-09-17 Sylor Mark W Liveexception system
US7617313B1 (en) * 2004-12-27 2009-11-10 Sprint Communications Company L.P. Metric transport and database load
US7742424B2 (en) * 2006-06-09 2010-06-22 Alcatel-Lucent Usa Inc. Communication-efficient distributed monitoring of thresholded counts
US8060606B2 (en) * 1999-05-03 2011-11-15 Digital Envoy, Inc. Geo-intelligent traffic reporter
US20110314151A1 (en) * 2007-01-05 2011-12-22 Jeremy Wyld Background task execution over a network
US20120016983A1 (en) * 2006-05-11 2012-01-19 Computer Associated Think, Inc. Synthetic Transactions To Test Blindness In A Network System
US20120042051A1 (en) * 1999-10-04 2012-02-16 Google Inc. System and Method for Monitoring and Analyzing Internet Traffic
US8260739B1 (en) * 2005-12-29 2012-09-04 At&T Intellectual Property Ii, L.P. Method and apparatus for layering software agents in a distributed computing system
US8332458B2 (en) * 2006-03-20 2012-12-11 Technion Research & Development Foundation Ltd. Monitoring threshold functions over distributed data sets

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5425705A (en) * 1993-02-22 1995-06-20 Stanford Surgical Technologies, Inc. Thoracoscopic devices and methods for arresting the heart
WO1994020025A1 (fr) * 1993-03-04 1994-09-15 Microsurge, Inc. Instrument chirurgical
US5540684A (en) * 1994-07-28 1996-07-30 Hassler, Jr.; William L. Method and apparatus for electrosurgically treating tissue
US6190386B1 (en) * 1999-03-09 2001-02-20 Everest Medical Corporation Electrosurgical forceps with needle electrodes
US6464702B2 (en) * 2001-01-24 2002-10-15 Ethicon, Inc. Electrosurgical instrument with closing tube for conducting RF energy and moving jaws
US7291161B2 (en) * 2002-10-02 2007-11-06 Atricure, Inc. Articulated clamping member
US7628792B2 (en) * 2004-10-08 2009-12-08 Covidien Ag Bilateral foot jaws

Patent Citations (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5539690A (en) * 1994-06-02 1996-07-23 Intel Corporation Write verify schemes for flash memory with multilevel cells
US6182157B1 (en) * 1996-09-19 2001-01-30 Compaq Computer Corporation Flexible SNMP trap mechanism
US6430613B1 (en) * 1998-04-15 2002-08-06 Bull, S.A. Process and system for network and system management
US7453815B1 (en) * 1999-02-19 2008-11-18 3Com Corporation Method and system for monitoring and management of the performance of real-time networks
US8060606B2 (en) * 1999-05-03 2011-11-15 Digital Envoy, Inc. Geo-intelligent traffic reporter
US20120042051A1 (en) * 1999-10-04 2012-02-16 Google Inc. System and Method for Monitoring and Analyzing Internet Traffic
US20070088823A1 (en) * 1999-10-27 2007-04-19 Fowler John J Method and System for Monitoring Computer Networks and Equipment
US6571285B1 (en) * 1999-12-23 2003-05-27 Accenture Llp Providing an integrated service assurance environment for a network
US20030079012A1 (en) * 2000-02-17 2003-04-24 Marsland Christopher John Kemote monitoring
US20090234944A1 (en) * 2000-06-21 2009-09-17 Sylor Mark W Liveexception system
US7113988B2 (en) * 2000-06-29 2006-09-26 International Business Machines Corporation Proactive on-line diagnostics in a manageable network
US6947972B2 (en) * 2000-12-01 2005-09-20 Samsung Electronics Co., Ltd. Alarm management system and method thereof for network management system
US8402129B2 (en) * 2001-03-21 2013-03-19 Alcatel Lucent Method and apparatus for efficient reactive monitoring
US20020138599A1 (en) * 2001-03-21 2002-09-26 Mark Dilman Method and apparatus for efficient Reactive monitoring
US6643613B2 (en) * 2001-07-03 2003-11-04 Altaworks Corporation System and method for monitoring performance metrics
US7076695B2 (en) * 2001-07-20 2006-07-11 Opnet Technologies, Inc. System and methods for adaptive threshold determination for performance metrics
US20030061345A1 (en) * 2001-09-27 2003-03-27 Atsushi Kawasaki Network monitoring device and method
US20030139905A1 (en) * 2001-12-19 2003-07-24 David Helsper Method and system for analyzing and predicting the behavior of systems
US20030198190A1 (en) * 2002-04-19 2003-10-23 Rajendran Rajan Method and system for traffic monitoring in a packet communication network
US7170791B2 (en) * 2003-05-20 2007-01-30 Sharp Kabushiki Kaisha Programming verification method of nonvolatile memory cell, semiconductor memory device, and portable electronic apparatus having the semiconductor memory device
US7031264B2 (en) * 2003-06-12 2006-04-18 Avaya Technology Corp. Distributed monitoring and analysis system for network traffic
US7457868B1 (en) * 2003-12-30 2008-11-25 Emc Corporation Methods and apparatus for measuring network performance
US20050188221A1 (en) * 2004-02-24 2005-08-25 Covelight Systems, Inc. Methods, systems and computer program products for monitoring a server application
US7430688B2 (en) * 2004-09-24 2008-09-30 Fujitsu Limited Network monitoring method and apparatus
US7617313B1 (en) * 2004-12-27 2009-11-10 Sprint Communications Company L.P. Metric transport and database load
US20060291657A1 (en) * 2005-05-03 2006-12-28 Greg Benson Trusted monitoring system and method
US20060282530A1 (en) * 2005-06-14 2006-12-14 Klein Stephen D Methods and apparatus for end-user based service monitoring
US20070171744A1 (en) * 2005-12-28 2007-07-26 Nima Mokhlesi Memories with alternate sensing techniques
US8260739B1 (en) * 2005-12-29 2012-09-04 At&T Intellectual Property Ii, L.P. Method and apparatus for layering software agents in a distributed computing system
US8332458B2 (en) * 2006-03-20 2012-12-11 Technion Research & Development Foundation Ltd. Monitoring threshold functions over distributed data sets
US20120016983A1 (en) * 2006-05-11 2012-01-19 Computer Associated Think, Inc. Synthetic Transactions To Test Blindness In A Network System
US7742424B2 (en) * 2006-06-09 2010-06-22 Alcatel-Lucent Usa Inc. Communication-efficient distributed monitoring of thresholded counts
US20080069334A1 (en) * 2006-09-14 2008-03-20 Lorraine Denby Data compression in a distributed monitoring system
US20080183855A1 (en) * 2006-12-06 2008-07-31 International Business Machines Corporation System and method for performance problem localization
US20110314151A1 (en) * 2007-01-05 2011-12-22 Jeremy Wyld Background task execution over a network
US20080209032A1 (en) * 2007-02-22 2008-08-28 Inventec Corporation Alarm method for insufficient storage space of network storage system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100325265A1 (en) * 2009-06-18 2010-12-23 Technion Research & Development Foundation Ltd. Method and system of managing and/or monitoring distributed computing based on geometric constraints
US8949409B2 (en) * 2009-06-18 2015-02-03 Technion Research & Development Foundation Limited Method and system of managing and/or monitoring distributed computing based on geometric constraints
CN107426011A (zh) * 2017-05-22 2017-12-01 郑州云海信息技术有限公司 一种对设备运行状态的监控方法及装置

Also Published As

Publication number Publication date
WO2009036346A2 (fr) 2009-03-19
WO2009036346A3 (fr) 2009-05-14

Similar Documents

Publication Publication Date Title
US8402129B2 (en) Method and apparatus for efficient reactive monitoring
US11089041B2 (en) Method and system for confident anomaly detection in computer network traffic
Dilman et al. Efficient reactive monitoring
US8588074B2 (en) Data transfer path evaluation using filtering and change detection
Altman et al. A stochastic model of TCP/IP with stationary random losses
US7778179B2 (en) Using filtering and active probing to evaluate a data transfer path
EP2374245B1 (fr) Contrôle de transmission de paquets utilisant une estimation de bande passante
US8516104B1 (en) Method and apparatus for detecting anomalies in aggregated traffic volume data
EP1900150B1 (fr) Procédé et système de surveillance pour analyse d'echantillons de données comprenant un grand nombre de paquets de données
EP1187401A2 (fr) Méthode et systèmes pour atténuer la congestion d'un réseau
US20090077156A1 (en) Efficient constraint monitoring using adaptive thresholds
US7391740B2 (en) Method for quantifying reponsiveness of flow aggregates to packet drops in a communication network
US20040037223A1 (en) Edge-to-edge traffic control for the internet
Tang et al. FR-RED: Fractal residual based real-time detection of the LDoS attack
Kliazovich et al. Logarithmic window increase for TCP Westwood+ for improvement in high speed, long distance networks
Bohacek et al. Signal processing challenges in active queue management
Bergfeldt et al. Real-time available-bandwidth estimation using filtering and change detection
WO2008153840A2 (fr) Surveillance à bon rendement des contraintes par utilisation de seuils adaptatifs
Li et al. Robust EKF-based wireless congestion control
US8218452B2 (en) Network detection of real-time applications using incremental linear regression
Marupally et al. Bandwidth variability prediction with rolling interval least squares (RILS)
CN114553458A (zh) 一种电力物联网环境下的可信群体的构建与动态维护方法
Tunali et al. Adaptive available bandwidth estimation for internet video streaming
Al-Sbou et al. A novel quality of service assessment of multimedia traffic over wireless ad hoc networks
Bohacek et al. TCP throughput and timeout-steady state and time-varying dynamics

Legal Events

Date Code Title Description
AS Assignment

Owner name: LUCENT TECHNOLOGIES, INC., NEW JERSEY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KASHYAP, SRINIVAS RAGHAV;RASTOGI, RAJEEV;JEYASHANKHER, S R;AND OTHERS;REEL/FRAME:021117/0607;SIGNING DATES FROM 20080401 TO 20080514

AS Assignment

Owner name: CREDIT SUISSE AG, NEW YORK

Free format text: SECURITY AGREEMENT;ASSIGNOR:LUCENT, ALCATEL;REEL/FRAME:029821/0001

Effective date: 20130130

Owner name: CREDIT SUISSE AG, NEW YORK

Free format text: SECURITY AGREEMENT;ASSIGNOR:ALCATEL LUCENT;REEL/FRAME:029821/0001

Effective date: 20130130

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: ALCATEL LUCENT, FRANCE

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG;REEL/FRAME:033868/0555

Effective date: 20140819